Reference : Natural Strategic Abilities in Voting Protocols
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/45849
Natural Strategic Abilities in Voting Protocols
English
Jamroga, Wojciech mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA >]
Kurpiewski, Damian []
Malvone, Vadim []
2020
Proceedings of the 10th International Workshop on Socio-Technical Aspects in Security STAST 2020
Springer
Yes
International
10th International Workshop on Socio-Technical Aspects in Security STAST 2020
17/18 Sept 2020
[en] electronic voting ; coercion resistanc ; graded security
[en] Security properties are often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the property at hand. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks.Here, we propose a graded notion of security based on the complexity of the user’s strategic behavior. More precisely, we suggest that the level to which a security property φ is satisfied can be defined in terms of (a)the complexity of the strategy that the voter needs to execute to make φ true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain φ, the higher the degree of security. We demonstrate how the idea works in a case study based on an electronicv oting scenario. To this end, we model the vVote implementation of thePrˆet `a Voter voting protocol for coercion-resistant and voter-verifiable elections. Then, we identify “natural” strategies for the voter to obtain receipt-freeness, and measure the voter’s effort that they require. We also look at how hard it is for the coercer to compromise the election through a randomization attack.
Researchers ; Professionals
http://hdl.handle.net/10993/45849
https://arxiv.org/abs/2007.12424
FnR ; FNR12685695 > Peter Y. A. Ryan > STV > Socio-technical Verification Of Information Security And Trust In Voting Systems > 01/09/2019 > 31/08/2022 > 2018

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
2007.12424[1].pdfAuthor preprint207.63 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.